The modern data center contains a number of different services. In this video, you’ll learn about web services, file services, mail services, security services, and much more.
As technology as improved, we’ve added more and more functionality to our security gateways. In this video, you’ll learn about unified threat management appliances and the functionality they bring to securing our network resources.
If you need to identify and stop network, operating system, and application vulnerabilities, then you’ll probably want to consider an IDS or IPS. In this video, you’ll learn about intrusion identification technologies and how they are used to prevent the exploit of vulnerabilities.
The information traversing the network can be a valuable source of forensic data. In this video, you’ll learn about some common data gathering techniques for network traffic data.
When do you detect, and when do you prevent? In this video, you’ll learn the advantages of cameras vs. guards and the differences between IDS and IPS strategies.
As network professionals, we rely on some core security devices to protect our network. In this video, you’ll learn about network-based firewalls, host-based firewalls, IDS/IPS, and VPN concentrators.
The network is a constantly moving river of information, and it may be necessary to occasionally test the water as it flows by. In this video module, you’ll learn the reasons for scanning your network and the different technologies available to gather information. We’ll also dive into packet analyzers, intrusion detection systems, intrusion prevention systems, and port scanners.
Not all network devices are common in every environment. In this video you’ll learn about specialized network devices that go beyond the capabilities of traditional networks such as content switches, IDS/IPS, load balancers, bandwidth shapers, proxy servers, and more.